Enumerate all active network interfaces of a host REMOTELY!
Installation
See GitHub.
Kali
git clone https://github.com/mubix/IOXIDResolver.git
Windows
- Download ZIP file from https://github.com/mubix/IOXIDResolver
- Install Python from the Microsoft Store.
- Install impacket
pip install impacket
pip --cert "C:\Users\<path>\certificate.pem" --proxy http://proxy.example.com:8080 install impacket
cd IOXIDResolver-master
python3 IOXIDResolver.py -t x.x.x.x
Help
python3 IOXIDResolver.py -h
Enumeration
python3 IOXIDResolver.py -t $IP
Code
IOXIDResolver.py
#!/usr/bin/python
import sys, getopt
from impacket.dcerpc.v5 import transport
from impacket.dcerpc.v5.rpcrt import RPC_C_AUTHN_LEVEL_NONE
from impacket.dcerpc.v5.dcomrt import IObjectExporter
def main(argv):
try:
opts, args = getopt.getopt(argv,"ht:",["target="])
except getopt.GetoptError:
print ('IOXIDResolver.py -t <target>')
sys.exit(2)
target_ip = "192.168.1.1"
for opt, arg in opts:
if opt == '-h':
print ('IOXIDResolver.py -t <target>')
sys.exit()
elif opt in ("-t", "--target"):
target_ip = arg
authLevel = RPC_C_AUTHN_LEVEL_NONE
stringBinding = r'ncacn_ip_tcp:%s' % target_ip
rpctransport = transport.DCERPCTransportFactory(stringBinding)
portmap = rpctransport.get_dce_rpc()
portmap.set_auth_level(authLevel)
portmap.connect()
objExporter = IObjectExporter(portmap)
bindings = objExporter.ServerAlive2()
print ("[*] Retrieving network interface of " + target_ip)
#NetworkAddr = bindings[0]['aNetworkAddr']
for binding in bindings:
NetworkAddr = binding['aNetworkAddr']
print ("Address: " + NetworkAddr)
if __name__ == "__main__":
main(sys.argv[1:])